CN104009997B - A kind of extensive method in the road network environment position based on entropy - Google Patents

A kind of extensive method in the road network environment position based on entropy Download PDF

Info

Publication number
CN104009997B
CN104009997B CN201410252465.6A CN201410252465A CN104009997B CN 104009997 B CN104009997 B CN 104009997B CN 201410252465 A CN201410252465 A CN 201410252465A CN 104009997 B CN104009997 B CN 104009997B
Authority
CN
China
Prior art keywords
extensive
highway
subnet
entropy
line set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410252465.6A
Other languages
Chinese (zh)
Other versions
CN104009997A (en
Inventor
倪巍伟
马中希
陆介平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201410252465.6A priority Critical patent/CN104009997B/en
Publication of CN104009997A publication Critical patent/CN104009997A/en
Application granted granted Critical
Publication of CN104009997B publication Critical patent/CN104009997B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of extensive method of the location of mobile users towards network of highways environment based on entropy, comprises the following steps:Trusted third party's server storage network of highways information; mobile subscriber submits self-position to trusted third party's server and the secret protection constraints based on entropy; trusted third party's server according to user with regard to entropy secret protection constraints; location of mobile users is carried out extensive; generate the extensive highway subnet comprising location of mobile users and replace user's particular location so that attacker can backstepping go out secret protection of the possibility sexual satisfaction mobile subscriber of customer location based on entropy and constrain.The present invention describes user to constraint of the mobile object in terms of highway distributed architecture in extensive highway subnet using comentropy, it is to avoid attacker is launched a offensive using grasped part mobile object distributed intelligence.

Description

A kind of extensive method in the road network environment position based on entropy
Technical field
The present invention relates to a kind of extensive method of position coordinates, and in particular to be a kind of position of road network environment based on entropy Put the extensive method of coordinate.
Background technology
In recent years, it is widely used in computer application field based on the service of positional information, for example GPS leads Boat, spatial-attribute mutual query etc..This kind of application majority needs mobile subscriber's configuration obtain user site positional information (2 Dimension latitude and longitude coordinates) equipment (such as GPS terminal), mobile subscriber pass through to service provider send current position coordinates, clothes Business provider returns the related service with regard to location of mobile users, and for example, its position coordinates is submitted to server by mobile subscriber Obtain away from several nearest gas stations of its position etc..With growing interest of the user to individual private data, mobile subscriber is not Wish for itself accurate location coordinate to be supplied to service provider, often take and extensive rear position coordinates is supplied to service offer Side, an extensive focus for becoming database and information security research of location of mobile users coordinate.
In conjunction with true network of highways environment, the extensive method majority in existing position submits to the credible 3rd using by position coordinates Square server, is generalized for position coordinates comprising the coordinate by trusted third party's server and meets mobile object location privacy peace The full highway subnet for requiring is realized hiding, to ensure location of mobile users personal secrets.Conventional (k, l)-location privacy mould Type, it is desirable to the highway subnet that location of mobile users coordinate is generalized for meeting following conditions:(1) highway subnet includes the position; (2) including at least k-1 other mobile subscribers in highway subnet;(3) including at least the highway that l bars are different in highway subnet.To the greatest extent Manage (k, l)-location privacy model and include at least k mobile subscriber by requiring highway subnet, and meet section l diversity and want Ask, it is ensured that the probability that inquiry's standard navigates to certain section is less than 1/k and 1/l by attacker.But there is following asking in the model Topic:Model lacks to constraint of the mobile object with regard to section distribution characteristics in subnet in extensive subnet so that attacker utilizes institute Grasp part mobile object distributed intelligence is launched a offensive and is possibly realized.
In the extensive research field of road network environment customer location, location privacy intensity refers to that attacker is deduced by background knowledge User exact position or latched position are located at the complexity on certain road.
Content of the invention
Technical problem:Present invention aim at provide a kind of facilitating user to describe in extensive subnet mobile object with regard to subnet The extensive method in the road network environment position based on entropy of interior section distribution characteristics constraint.
Technical scheme:The extensive method in road network environment position based on entropy of the invention, comprises the following steps:
(1) mobile subscriber is to trusted third party server input current location u, extensive subnet distribution entropy threshold d, subnet bag The k of threshold value containing number of users, included highway number threshold value l of subnet, three threshold values are positive integer;
(2) trusted third party's server inquires about current location u places highway side e in network of highways G, initializes extensive subnet Highway line set S is { e }, and wherein { e } is the set that current location u places highway side e is constituted;
(3) if currently extensive subnet highway line set S is met comprising number of users less than public affairs in number of users threshold value k, or set S Roadside number is less than highway number threshold value l, or extensive subnet Distribution Entropy D (S) is less than, then proceed to step (4);Otherwise, proceed to Step (6), Distribution Entropy when wherein extensive subnet Distribution Entropy D (S) represents that the corresponding line set of extensive subnet is S;
(4) trusted third party's server searches all highway sides in currently extensive subnet highway line set S in network of highways G Adjacent highway side e ', the set of these the adjacent highway side e ' for finding is designated as R;
(5) set of computations R Zhong Meitiao highways side e ' is incorporated to the personal secrets/search efficiency of extensive subnet highway line set S Factor F (S ∪ e '), choose the personal secrets/search efficiency factor in R maximum and exist user highway side e ' disposed thereon and Enter extensive subnet highway line set S, obtain return to step (3) after extensive subnet highway line set S for updating;
(6), by not highway edge contract in set S in network of highways G, remaining subnet is used as position u for trusted third party's server Extensive subnet feed back to user.
In the present invention, wherein network of highways G can adopt non-directed graph representation, shape such as G (VG,EG), wherein VGRepresent network of highways The intersection point set of middle highway, EGRepresent the set in all sections in network of highways.
In the step of the inventive method preferred version (3), extensive subnet Distribution Entropy User distribution probability of the wherein p (e) for highway side e,Highway side e ∈ S, N (e) are on the e of highway side Number of users.
Personal secrets/search efficiency factor in another preferred version of the inventive method, in step (5)Distribution Entropy when wherein D (S ∪ e ') represents that the corresponding line set of extensive subnet is S ∪ e ', | S ∪ e ' | For highway side number in extensive subnet highway line set S ∪ e '.
Beneficial effect:For the extensive application of road network environment customer location, the present invention realizes that trusted third party's server is participated in Customer location is generalized for highway subnet.The present invention compared with prior art, with advantages below:
The present invention supports that user adds about with regard to section distribution characteristics in subnet to mobile object in extensive rear highway subnet Beam, prevent attacker using grasped part mobile object distributed intelligence launch a offensive situation generation, improve customer location privacy Protection security.
The common extensive method based on (k, l) privacy model, it is allowed to the minimal user that the extensive subnet of user input includes The minimum highway number l that number k and extensive subnet include, realizes that user is required with regard to self-position and privacy of identities protection.Extensive son Net is disclosed to potential attacker, i.e., attacker can obtain the node for constituting extensive subnet, public roadside information, and every Number of users information present on bar highway side.Even if containing at least k different user, and these use in extensive subnet Family is distributed at least l bars highway side.If these users are not generally evenly distributed on every highway side, the obvious energy of attacker Extensive subnet in those distributed users more highway side is enough drawn, it is more likely that proposing extensive request user (i.e. current location User in u) the highway side that is located, so as to cause the leakage for proposing extensive request customer location and privacy of identities information.For example, If proposing extensive request user input parameter k=10, l=4, if the extensive subnet for ultimately generating includes 6 highway sides, positioned at each Total number of users on bar highway side is 15, it is clear that the extensive subnet meets constraint of the user with regard to k and l, if 15 users exist Highway is (it is assumed that on when 15 users are centrally located at a certain bar highway, on remaining 5 highway side, public per bar in upper skewness Roadside only one of which user), attacker will conclude that the user for proposing extensive request is located at the highway side for having concentrated 15 users On possibility be 75%.
The present invention is by introducing highway point entropy threshold parameter, it is allowed to which user is on the included Ge Tiao highways side of extensive rear subnet The constraint of user distribution uniformity coefficient, set distribution entropy threshold are bigger, finally in extensive subnet user on each highway side Distribution more uniform, so as to reduce attacker using mobile object distributed intelligence in grasped extensive subnet launch a offensive situation send out Raw, improve customer location secret protection security.When implementing, the present invention passes through to arrange personal secrets/search efficiency factor, Choose every time the maximum adjacent highway side of personal secrets/search efficiency factor and add extensive subnet, personal secrets/search efficiency because Sub- maximum means that this adds the highway side in extensive subnet, by the Distribution Entropy increase for causing the included user of extensive subnet most Greatly, less so as to ensure the extensive subnet size for ultimately generating (comprising highway side number).
Description of the drawings
Fig. 1 is present system frame diagram;
Fig. 2 is trusted third party's server process flow chart of the present invention;
Network of highways schematic diagrames of the Fig. 3 for the embodiment of the present invention;
Extensive subnet schematic diagrames of the Fig. 4 for the embodiment of the present invention.
Specific embodiment
For being easy to understand technological means, creation characteristic, reached purpose and effect of present invention realization, with reference to Specific embodiment and Figure of description, are expanded on further the present invention.
Network of highways G as shown in Figure 3, by 14 nodes (empty circles), 19 highway sides compositions, the black circle in each edge The mobile subscriber being correspondingly located on the highway, has 16 users.Three threshold parameters by the user setup for proposing extensive request, Positive integer is, numerical value is bigger, constraint is stronger, and security is higher.Lift extensive request user according to itself to extensive rear subnet Security requirement, arranges k=4, l=3, d=2, that is, think that trusted third party's server is ultimately generated in extensive subnet comprising 4 Above user (containing the user itself), subnet is made up of more than 3 highway sides, and extensive subnet Distribution Entropy is minimum is, Then meet which to require the protection of self-position personal secrets.
The extensive process of the present embodiment is as follows:
1st step. execution step (1), position send self-position u, parameter k for the user of u to trusted third party's server =4, l=3, d=2;
2nd step. execution step (2), trusted third party's whois lookup to user u places highway side n13n14, and at the beginning of by S Begin to turn to { n13n14};
3rd step. execution step (3), due to | S |=1<3, the highway side number of composition subnet is met less than 3, go to step (4);
4th step. execution step (4), search highway side n in S13n14Adjacent highway side, and generate the adjacent highway side of S Set R={ n8n14, n9n14, n6n13};
5th step. execution step (5), set of computations R Zhong Meitiao highways side e ' are incorporated to the hidden of extensive subnet highway line set S Private safety/search efficiency factor F (S ∪ e '):
The highway side n for selecting personal secrets/search efficiency factor maximum8n14Set S is incorporated to, now, S={ n13n14, n8n14};Return to step (3);
6th step. execution step (3), due to | S |=2<3, N (S)=4, D (S)=1<4, meet in S and move on highway side Total number of users is less than l, or extensive subnet Distribution Entropy less than highway side number in k, or SCondition, goes to step (4);
7th step. execution step (4), search S in highway while adjacent highway while, generate S adjacent highway line set R= {n9n14, n6n13, n5n8, n2n8};
8th step. execution step (5), set of computations R Zhong Meitiao highways side e ' are incorporated to the hidden of extensive subnet highway line set S Private safety/search efficiency factor F (S ∪ e '):
F(S∪n9n14)=0.51, F (S ∪ n6n13)=0.51, F (S ∪ n5n8)=0.53, F (S ∪ n2n8)=0.51
The highway side n for selecting personal secrets/search efficiency factor maximum5n8S is incorporated to, now S={ n13n14, n8n14, n5n8};Again return to step (3);
9th step. execution step (3), due to D (S)=1.585<4, mobile subscriber's sum is met in S on highway side less than k, Or highway side number is less than l, or extensive subnet Distribution Entropy in SCondition, goes to step (4);
10th step. execution step (4), search S in highway while adjacent highway while, generate S adjacent highway line set R= {n9n14, n6n13, n5n8, n2n8, n1n5, n5n6};
11st step. execution step (5), calculate the privacy peace that R Zhong Meitiao highways side e ' are incorporated to extensive subnet highway line set S Entirely/search efficiency factor F (S ∪ e '):Highway side n1n5Corresponding maximum is 0.52, selects highway side n1n5It is incorporated to S, S= {n13n14, n8n14, n5n8, n1n5, return to step (3);
12nd step. execution step (3), due to D (S)=2.07>2, and | S |=4>3, N (S)=8>4, it is unsatisfactory in S public On roadside, mobile subscriber's sum is less than l, or extensive subnet Distribution Entropy less than highway side number in k, or SCondition, turns Step (6);
13rd step. execution step (6), trusted third party's server are generated by n13n14, n8n14, n5n8, n1n5Four edges are constituted Extensive subnet replace the particular location of user u.Position for the user of u extensive subnet as shown in figure 4, composition extensive subnet In each edge, number of users is uniform, such that it is able to avoid user distribution on each highway side of the attacker by the extensive subnet of composition poor Different information, initiates the attack to u.
Technical scheme, the advantage of general principle sum has been shown and described above.It should be understood that above-described embodiment is only For the specific embodiment of technical solution of the present invention is described, rather than limit the scope of the present invention.Reading the present invention Afterwards, those skilled in the art fall within the application claim and are limited to the modification and replacement of the various equivalents of the present invention Fixed protection domain.

Claims (2)

1. a kind of extensive method in road network environment position based on entropy, it is characterised in that the method includes following step:
(1) mobile subscriber is distributed entropy threshold d to trusted third party server input current location u, extensive subnet, and subnet includes use Amount threshold value k, included highway number threshold value l of subnet, three described threshold values are positive integer;
(2) trusted third party's server inquires about current location u places highway side e in network of highways G, initializes extensive subnet highway Line set S is { e }, and wherein { e } is the set that current location u places highway side e is constituted;
(3) if currently extensive subnet highway line set S is met comprising number of users less than highway side in number of users threshold value k, or set S Number is less than highway number threshold value l, or extensive subnet Distribution Entropy D (S) is less thanStep (4) is then proceeded to;Otherwise, step is proceeded to (6) Distribution Entropy when, wherein extensive subnet Distribution Entropy D (S) represents that the corresponding line set of extensive subnet is S;
(4) trusted third party's server searches the neighbour on all highway sides in currently extensive subnet highway line set S in network of highways G Highway side e ' is met, the set of these the adjacent highway side e ' for finding is designated as R;
(5) set of computations R Zhong Meitiao highways side e ' is incorporated to personal secrets/search efficiency factor F of extensive subnet highway line set S (S ∪ e '), choose the personal secrets/search efficiency factor in R maximum and exist user highway side e ' disposed thereon be incorporated to extensive Subnet highway line set S, obtains return to step (3) after extensive subnet highway line set S for updating, the personal secrets/inquiry Efficiency factorDistribution when wherein D (S ∪ e ') represents that the corresponding line set of extensive subnet is S ∪ e ' Entropy, | S ∪ e ' | are highway side number in extensive subnet highway line set S ∪ e ';
(6) the remaining subnet for obtaining is made by trusted third party's server by the highway edge contract in network of highways G not in set S Extensive subnet for position u feeds back to user.
2. the extensive method in road network environment position according to claim 1 based on entropy, it is characterised in that:In step (3), Extensive subnet Distribution EntropyUser distribution probability of the wherein p (e) for highway side e,Highway side e ∈ S, N (e) are the number of users on the e of highway side.
CN201410252465.6A 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy Active CN104009997B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410252465.6A CN104009997B (en) 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410252465.6A CN104009997B (en) 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy

Publications (2)

Publication Number Publication Date
CN104009997A CN104009997A (en) 2014-08-27
CN104009997B true CN104009997B (en) 2017-03-15

Family

ID=51370491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410252465.6A Active CN104009997B (en) 2014-06-09 2014-06-09 A kind of extensive method in the road network environment position based on entropy

Country Status (1)

Country Link
CN (1) CN104009997B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486726B (en) * 2014-12-18 2015-09-16 东南大学 A kind of user of protection looks forward to the prospect the extensive method in road network environment position of location privacy
CN107169372B (en) * 2017-05-10 2020-04-14 东南大学 Privacy protection query method based on Voronoi polygon and Hilbert curve coding
CN111556437B (en) * 2020-05-12 2021-11-16 重庆邮电大学 Personalized position privacy protection method based on differential privacy

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2017790A2 (en) * 2007-07-16 2009-01-21 Charles Graham Palmer Position-based charging
CN103281672A (en) * 2013-06-08 2013-09-04 南京大学 Method for protecting position privacy by mobile terminals
CN103596133A (en) * 2013-11-27 2014-02-19 哈尔滨工业大学深圳研究生院 Location anonymous method and device for continuous queries and privacy protection system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2017790A2 (en) * 2007-07-16 2009-01-21 Charles Graham Palmer Position-based charging
CN103281672A (en) * 2013-06-08 2013-09-04 南京大学 Method for protecting position privacy by mobile terminals
CN103596133A (en) * 2013-11-27 2014-02-19 哈尔滨工业大学深圳研究生院 Location anonymous method and device for continuous queries and privacy protection system

Also Published As

Publication number Publication date
CN104009997A (en) 2014-08-27

Similar Documents

Publication Publication Date Title
Ma et al. Quick convergence of genetic algorithm for QoS-driven web service selection
CN103345526B (en) A kind of efficient secret protection cryptogram search method under cloud environment
CN102378974B (en) Providing access to data item using access graphs
Hao et al. Deep reinforcement learning for edge service placement in softwarized industrial cyber-physical system
Lin et al. A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
CN106792992A (en) A kind of method and apparatus for providing WAP information
CN104080081B (en) A kind of space de-identification method suitable for mobile terminal location privacy protection
CN104009997B (en) A kind of extensive method in the road network environment position based on entropy
CN109002451A (en) Map datum vacuates method and device
CN104468805B (en) Message routing apparatus and method
CN105337841A (en) Information processing method and system, client, and server
CN109873809A (en) A kind of information security of computer network control system and method
Yang et al. Energy efficiency‐based device‐to‐device uplink resource allocation with multiple resource reusing
Serrano et al. Competition and adaptation in an Internet evolution model
CN104199964A (en) Information processing method and information processing device
CN104486726B (en) A kind of user of protection looks forward to the prospect the extensive method in road network environment position of location privacy
CN103984728A (en) Range query integrity verification method for outsourcing space database
CN106302110A (en) A kind of social network position sharing method based on secret protection
CN108648017A (en) It is easy to user demand matching process, device, equipment and the storage medium of extension
CN104317863A (en) License number inquiry method and system
Li et al. A dynamic population reduction differential evolution algorithm combining linear and nonlinear strategy piecewise functions
Amic et al. Dolphin swarm algorithm for cryptanalysis
CN116029392A (en) Joint training method and system based on federal learning
CN105159906A (en) Method and device for displaying information
CN107277806B (en) Privacy protection MAX/MIN query method facing WSNs rental environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant